The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grass modeling has been a high attention problem in computer graphics field for recent years. This paper builds the multidimensional parameters geometrical model of blade firstly, and then makes the random translation and rotation transformation for blades, finally, forms the concentric circles model of the grass. And to improve the render speed, we can clip of grass scene by using the relation between...
In this paper, we introduce a new algorithm λ -WFC based on fuzzy cluster into the indoor location of WSN. First, a location fingerprint database is set up and we calculate an optimal value of λ which is a threshold for classifying the RSS vectors in the off-line training phase. Then in the locating phase, after fuzzy clustering has been done, we estimate the degree of similarity between two vectors...
This paper proposes a new non-embedded audio watermark scheme based on wavelet transform. The input audio signal is first transformed into a series of wavelet coefficients at different resolution via Fast Wavelet Transform. The energy ratio sequence (ERS) of the high frequency component in forth scale is then calculated. The copyright information is transformed into a key of digital watermark coding...
Wireless sensor networks(WSNs), which is utilized in a broad region, is able to monitor and collect various information of different objects. location plays a critical role in WSNs. Currently, many localization algorithms are proposed such as the classical MDS localization algorithm. It has a low accuracy in large scale of sensor network with a lot of nodes. For this defect, this paper proposes a...
This paper presents the establishment of cluster computing lab at a minority serving institution that aims to provide computing resources to support undergraduate student research. We will firstly a project for building, configuring, and maintaining the cluster in the lab. The computing resources of the cluster are managed by a job distribution environment that allows the users to upload, compile,...
In cloud computing, the system should avoid wasting resources as a result of under-utilization and avoid lengthy response times as a result of over-utilization. Recent research has focused on the globally optimal solution in virtualized data centers. However, the globally optimal solution makes a lot of unnecessary migrations and cannot work in a large-scale cloud computing environment. In this paper,...
To solve the inefficiency problem of traditional PAM algorithm for initial cluster center, a new improved PAM algorithm is proposed. The algorithm builds minimum spanning tree and then splits it to get k initial clusters with the relevant cluster centers. Theory analysis and experimental results show that the found initial centers are closed to the desired cluster centers, and the improved algorithm...
To meet the demand of relation database copyright protection, a zero-watermarking algorithm is proposed. we introduce the idea of classification to database watermark working, giving a certain extent ease to the limit of data types and error bounds in database. This algorithm never changes the information of original object, but proves the databases' copyright belongs through the extraction of data's...
Method of gain firing data by calculate the group of differential equation has the advantages of high repeatability and high accuracy, But much of the CPU time is occupied by the task of re-iteration in computational processing. Therefore, it is not the real time processing. This paper introduces a method to quickly determine angle of firing by iteration method, which realizes Runge-Kutta method for...
Software development is a complex task as there exist various relationships between different pieces of code. If software entities (e.g., classes) are considered as nodes and the relationships between entities (e.g., inheritance) are considered as edges, the static structure of software can be viewed as a software structural network. In this paper, the relationship between the quality of nodes and...
Futures traders increasingly use program trading systems for one or more stages of the trading process. In order to stay competitive, futures firms have to rely more on their program trading systems to increase their responsiveness to market conditions. First, an overview of how these systems work was introduced. Then, aiming at the traits of Chinese futures trading information system, a distributed...
This paper presents a ontology-based semantic query expansion method. This method takes the food safety domain as a background and combines concepts similarity computation model. Firstly, the ontology-based representation method for food safety domain knowledge is proposed. Then, the expansion of queries is realized by the semantic relationships in food safety ontology and the expansion of the lexicon...
In recent years, with the wide application of UAV, as an important component of the UAV system, ground monitor and control system for UAV is also in constant updates. In order to satisfy people with higher requirements of information timeliness, this paper introduces the design about ground monitor and control system for UAV remote sensing based on World Wind, whose functions include 3D GIS display...
This paper adopts Social Network Analysis (SNA) [1] method to find the solution to crime networks mining and central figure determining. With the help of Fisher Discriminant Analysis method and Criminal Network Core-figure Discovery (CNCD), a threshold discriminating non-conspirators from conspirators and the leader of the crime network can be obtained. The paper starts with a small network model,...
This paper introduces a case-based reasoning hybrid agent structure in the background of machine tools of an intelligent design system. The structure consists of eight modules and the core ones are learning modules, retrieval modules and decision-making modules. The study mainly concerns on the common knowledge sharing and reuse in system and its purpose is to reduce the design redundancy of the process,...
Using fuzzy c-means clustering procedure to find a condensed set for Parzen windows estimation (ParzenFCMC) is proposed in this paper. The full Parzen windows estimator usually requires more computation and storage. However, the experimental simulations show that the significant increase of reference data may not improve the estimation performance of Parzen windows method obviously. In addition, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.